未加星标

Windows Ransomware Protection Can Be Hacked Easily

字体大小 | |
[系统(windows) 所属分类 系统(windows) | 发布者 店小二03 | 时间 2018 | 作者 红领巾 ] 0人收藏点击收藏

Windows Ransomware Protection Can Be Hacked Easily
Windows Ransomware Protection Can Be Hacked Easily

Microsoft has recenty added a feature, known as Controlled Folder Access. The feature has been used in order to stop modifications of files that are residing in protected folders that cannot be accessed by unknown programs. Unfortunately that feature has been bypassed by a simple registry value created y the researchers Soya Aoyama a security specialist at Fujitsu System Integration Laboratories Ltd.

Related: windows 10 Anniversary Update With Ransomware Protection

How the Bypass of Controlled Folder Access Happens

The researcher has demonstrated an attack via a malicious DLL injections into Windows Explorer. Since Explorer is in the trusted services of Windows, when the DLL is injected in it, it will run a a script that bypasses the feature for ransomware protection of Windows.

This can be achieved by attacking Windows “where it hurts most” the Windows Registry Editor. When started, th DLLs are loaded under a random sub-key, located in the following sub-key:

→ HKEY_CLASSES_ROOT*shellexContextMenuHandlers

This leads to several different outcomes, he main of which are the registry key that is created replicates itself to HKEY_LOCAL_MACHINE and HKEY_CLASSES_ROOT trees. When Windows Explorer is executed, it begins to load Shell.dll from the following registry sub-key:

→ HKEY_LOCAL_MACHINESOFTWAREClassesCLSID{90AA3A4E-1CBA-4233-B8BB-535773D48449}InProcServer32

Shortly after this happens, the malicious DLL is loaded into explorer.exe and the researcher simply set the default value of the DLL to 0.

What follows is that Windows Explorer (explorer.exe) is shut down and restarted with the malicious DLL being executed in it. This results in the complete bypassing of the Controlled Folder Access feature.

Not only the DLL did bypass Windows Defender, but it also bypassed big antivirus products, like:

Avast. ESET. Malwarebytes Premium. McAfee.

So the bottom line is that the researcher took advantage of the applications that have permissions over the Controlled Folder Access feature and (Read more...)

本文系统(windows)相关术语:三级网络技术 计算机三级网络技术 网络技术基础 计算机网络技术

tags: Windows,feature,DLL,Controlled,Access,Folder,Explorer
分页:12
转载请注明
本文标题:Windows Ransomware Protection Can Be Hacked Easily
本站链接:https://www.codesec.net/view/604214.html


1.凡CodeSecTeam转载的文章,均出自其它媒体或其他官网介绍,目的在于传递更多的信息,并不代表本站赞同其观点和其真实性负责;
2.转载的文章仅代表原创作者观点,与本站无关。其原创性以及文中陈述文字和内容未经本站证实,本站对该文以及其中全部或者部分内容、文字的真实性、完整性、及时性,不作出任何保证或承若;
3.如本站转载稿涉及版权等问题,请作者及时联系本站,我们会及时处理。
登录后可拥有收藏文章、关注作者等权限...
技术大类 技术大类 | 系统(windows) | 评论(0) | 阅读(30)